CFF Exam 10 -12

Is this your test? Login to manage it. If not, you can generate a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
2 points
Mounting a device on a computer running a foreign operating system has the advantage of permitting access to many operating system files that may contain cached or paged data that would normally be _____ when mounted under their native operating system.
2.
2 points
In which of the following settings is the intrinsic value standard most likely to be applied?
3.
2 points
Deleted files may be made unrecoverable by overwriting them with data by anti-forensic programs that are used to securely wipe files and storage devices. Such programs can securely wipe files by overwriting free storage space ______ with zeroes and ones.
4.
2 points
In which of the following roles is the practitioner not permitted to serve in bankruptcy proceedings?
5.
2 points
Debtor-creditor schemes are most likely to occur in cases of _______.
6.
2 points
The US National Institute of Standards and Technology Special Publication 800-86 defines _____ phases for the forensic process.
7.
2 points
In large law enforcement agencies, the computer forensic examiner is the person who _____.
8.
2 points
Once files are deleted from the trash bin, they are _____.
9.
2 points
In a computer forensics investigation, chain of custody is the responsibility of _______.
10.
2 points
Network forensics is _______.
11.
2 points
Once the power is off, the computer or storage device should be _____.
12.
2 points
Fraud auditor's are likely to use ________.
13.
2 points
In business bankruptcies, audited financial reports _______.
14.
2 points
In divorce, state law _____
15.
2 points
Secretly transferring assets and selling assets below market value refers to _______.
16.
2 points
With respect to computer forensic investigations and including opinions and conclusions in the practitioner's report, the practitioner ______
17.
2 points
Putting together pieces of deleted files is called _______.
18.
2 points
If a consumer debtor's current median income (adjusted for certain IRS-allowed deductions) exceeds specific maximum-income thresholds, ______ may request that the case be dismissed.
19.
2 points
Debt secured by an asset and considered a marital asset in a non-community state will be divided ______.
20.
2 points
A VPN may be used to hide a person's _____.
21.
2 points
Which of the following is not an objective of computer forensics?
22.
2 points
The computer forensics examiner may remove an entire computer from a crime scene and take it to a forensics lab. This approach involves ______.
23.
2 points
All of the following are true about arbitration in a marital setting except?
24.
2 points
FINCEN is useful in _______ investigations.
25.
2 points
Individual debtors who cannot pass a means test must file under ______.
26.
2 points
Withholding documents related to the debtor's property or financial affairs from the standing trustee or other officer of the court is an example of ______.
27.
2 points
Generally speaking, if the practitioner provides bankruptcy services in some other role besides that of a consultant, ______.
28.
2 points
The valuation date in a divorce engagement can be any of the following except ______.
29.
2 points
Encrypted data on a hard drive _____.
30.
2 points
Which of the following schedules and statements is not typically included with a bankruptcy filing?
31.
2 points
Which of the following situations does not involve concealed-assets fraud?
32.
2 points
IAFIS is an FBI system for looking up _______.
33.
2 points
When working with a cloned copy of a hard drive, the practitioner should ______.
34.
2 points
Rule 2004 of the Federal Bankruptcy code permits _____ to obtain a court order to examine any entity involved with the case.
35.
2 points
Denial of service attacks may be against _______.
36.
2 points
Means testing individuals is a central part of the most recent bankruptcy laws and has made it more difficult for individuals to have their debts ______.
37.
2 points
A court order has been issued to divide retirement benefits in the divorce action of Pam and Jerry. The court order has not yet been approved by the trustee of the retirement plan. The court order, at this time, is a ______.
38.
2 points
The first action with respect to a computer device is _______.
39.
2 points
Computers store files in disk clusters but generally don't put two files in the same cluster. This leads to ______.
40.
2 points
Fraud auditors are concerned with ______.
41.
2 points
The bankruptcy law requires _____ to investigate the client's filing.
42.
2 points
If an equalization note does not have a stated interest rate ______.
43.
2 points
A common issue for the practitioner is locating the origin of an individual or device that has communicated in some way over the internet. This is normally accomplished by identifying the location of the internet protocol (IP) address that is hidden inside each _____ on the internet.
44.
2 points
Which of the following is not a traditional are for LCN?
45.
2 points
Which of the following debts may be discharged in bankruptcy.
46.
2 points
Wear leveling applies to ______.
47.
2 points
Depleted pension funds, would most likely be associated with ______.
48.
2 points
When the target is a sophisticated user, IP tracing ______.
49.
2 points
Terrorism represents ______.
50.
2 points
Before a practitioner accepts a matrimonial forensics engagement he or she considers whether he or she?